Malicious MoltBot skills used to push password-stealing malware
嗯,用户让我帮忙总结一下这篇文章的内容,控制在100个字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头,直接写描述。首先,我得仔细阅读文章,理解主要信息。 文章讲的是OpenClaw这个AI助手的恶意软件包问题。不到一周时间,就有超过230个恶意包被发布到官方仓库和GitHub上。这些包伪装成合法工具,实际窃取敏感数据,比如API密钥、钱包私钥等。OpenClaw项目最近改名频繁,设计初衷是运行在本地,有持久记忆和多种资源集成能力,但如果配置不当就会有安全风险。 恶意包被称为“技能”,是可扩展功能的插件。安全研究员发现很多OpenClaw的管理界面暴露在公网。这些恶意技能假装是加密货币交易、金融工具或社交媒体服务,实际上注入了信息窃取的恶意软件。报告指出这是一个大规模活动,利用技能传播恶意软件。 大部分恶意技能是克隆的,名字随机化,但有些下载量很高。每个都有详细文档显得合法,并提到一个名为‘AuthTool’的工具。实际上这是个分发机制,在macOS和Windows上下载并执行恶意代码。 恶意软件被识别为NovaStealer变种,在macOS上绕过Gatekeeper,并窃取各种敏感数据。Koi Security也报告了大量恶意技能,并发现了名字混淆的情况。他们还提供了一个免费扫描器帮助用户检测。 开发者Peter Steinberger承认无法审核大量提交的技能,建议用户自行检查安全,并采取多层安全措施。 总结的时候需要抓住关键点:恶意包数量、伪装合法、窃取数据、传播方式、开发者回应和建议的安全措施。控制在100字以内的话,可能需要精简一些细节。 最后检查一下是否符合要求:中文总结、100字以内、直接描述内容。 </think> 超过230个伪装成合法工具的恶意软件包针对AI助手OpenClaw发布,窃取API密钥等敏感数据,通过伪装功能扩展传播,开发者建议用户加强安全防护以应对风险. 2026-2-2 19:15:17 Author: www.bleepingcomputer.com(查看原文) 阅读量:0 收藏

Malicious MoltBot skills used to push password-stealing malware

More than 230 malicious packages for the personal AI assistant OpenClaw (formerly known as Moltbot and ClawdBot) have been published in less than a week on the tool’s official registry and on GitHub.

Called skills, the packages pretend to be legitimate tools to deliver malware that steals sensitive data, like API keys, wallet private keys, SSH credentials, and browser passwords.

Originally named ClawdBot and switching to Moltbot and now OpenClaw in under a month, the project is a viral open-source AI assistant designed to run locally, with persistent memory and integrate with various resources (chat, email, local file system). Unless configured properly, the assistant introduces security risks.

Wiz

Skills are readily deployable plug-ins for OpenClaw that extend its functionality or provide specific instructions for specialized activities.

However, security researcher Jamieson O’Reilly recently highlighted that there are hundreds of misconfigured OpenClaw admin interfaces exposed on the public web.

Between January 27th and February 1st, two sets collectively counting more than 230 malicious skills were published to ClawHub (the assistant's official registry) and GitHub.

The skills impersonate legitimate utilities such as cryptocurrency trading automation, financial utilities, and social media or content services, but in the background, they injected information-stealing malware payloads onto users’ systems.

A report from community security portal OpenSourceMalware says that an ongoing large-scale campaign is using skills to spread info-stealing malware to OpenClaw users.

Malicious skills linked to a single developer
Malicious skills linked to a single publisher
Source OpenSourceMalware

Most of those are near-identical clones with randomized names, while some have reached popular status, downloaded thousands of times.

Each malicious skill contains extensive documentation to appear legitimate, including several highlighted mentions of a separate tool named ‘AuthTool,’ which is supposedly a critical requirement for the skill to run correctly.

The infection occurs when the victim follows the instructions in the documentation, similar to a ClickFix-type of attack.

Malicious instructions
Instructions in malicious skill documentation
Source: OpenSourceMalware

In reality, though, AuthTool is a malware-delivery mechanism. On macOS, it appears as a base64-encoded shell command that downloads a payload from an external address. On Windows, it downloads and runs a password-protected ZIP archive.

The malware dropped on macOS systems is identified as a variant of NovaStealer that can bypass Gatekeeper by using the ‘xattr -c’ command to remove quarantine attributes and request broad file system read access and communication with system services.

The stealer targets cryptocurrency exchange API keys, wallet files and seed phrases, browser wallet extensions, macOS Keychain data, browser passwords, SSH keys, cloud credentials, Git credentials, and ‘.env’ files.

A separate report from Koi Security counted 341 malicious skills on ClawHub after analysts scanned the entire repository of 2,857, attributing them to a single campaign.

Apart from the tools highlighted in the OpenSourceMalware report, Koi also found 29 typosquats for the ClawHub name, targeting common mistypes.

To help users stay safe, Koi Security also published a free online scanner that lets people paste a skill's URL to get a safety report.

OpenClaw skills scanner
OpenClaw skills scanner
Source: Koi Security

The creator of OpenClaw, Peter Steinberger, responded to OpenSourceMalware on X, admitting inability to review the massive number of skill submissions the platform receives right now, so users are responsible for double-checking their skills’ safety before deployment.

Users should be aware of OpenClaw's deep access to the system. A multi-layered security approach is recommended, which includes isolating the AI assistant in a virtual machine, giving it restricted permissions, and securing remote access to it (e.g., port restriction, blocking traffic).

tines

The future of IT infrastructure is here

Modern IT infrastructure moves faster than manual workflows can handle.

In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.


文章来源: https://www.bleepingcomputer.com/news/security/malicious-moltbot-skills-used-to-push-password-stealing-malware/
如有侵权请联系:admin#unsafe.sh